Wednesday, February 11, 2015

DARPA Hones Skills of Future Cyber Officers



By Cheryl Pellerin
DoD News, Defense Media Activity

WASHINGTON, Feb. 11, 2015 – After months of work with world-class experts and online challenges, 60 cadets and midshipmen from the three service academies and the Coast Guard Academy recently faced off in contests of full-spectrum offensive and defensive cyber skills.

The Defense Advanced Projects Research Agency, or DARPA, hosted the two-phase competition. CyberStakes Online was held in October, and CyberStakes Live was held Jan. 30-Feb. 1 in Pittsburgh.

Contestants came from the U.S. Air Force Academy, the U.S. Military Academy, the U.S. Naval Academy and, for the first time this year, the U.S. Coast Guard Academy.

Cybersecurity has become a national security priority, and U.S. Cyber Command is making progress toward its goal of integrating 6,000 cybersecurity experts into combat commands by 2016.

CyberStakes Live

Last year, as a contribution to the cyber training and education pipeline, DARPA launched its Service Academy CyberStakes effort. Since November, cadets and midshipmen have sharpened their cybersecurity skills with help from world-class experts. They also participated in CyberStakes Online, in which they had to tackle 60 interactive game-style challenges that tested their know-how in areas such as forensics, cryptography and reverse engineering.

The final contest, CyberStakes Live, was a decathlon-style computer security competition that set the 10 best teams against each other -- three from each service academy and one from the Coast Guard Academy -- and then mixed the competitors and let joint teams go head to head.

Gold, Silver and Bronze

The competition consisted of several events, each emphasizing different cyber skills and each conferring a gold, silver and bronze award. The individual and small-team competitions led to a capture-the-flag cyber tournament that put all the skills they learned to the test.

“The competition forces them to operate and perform under pressure to solve difficult and challenging problems,” Dr. Daniel “Rags” Ragsdale, DARPA program manager for the Service Academy CyberStakes, told DoD News in a Feb. 2 interview.

The cadets and midshipmen were expected to demonstrate adaptability and agility, “because these are the kinds of things we expect of all military leaders in all settings,” he added. “But because this is a relatively new domain of operation, we are helping them develop the kinds of skills that could be applied in the cyber realm.”

Ragsdale said it’s crucially important that military leaders have deep technical skills -- that they understand systems, software and vulnerabilities, and how vulnerabilities such as bugs in programs could be exploited to subvert the security of Defense Department systems.

Full-spectrum Skills

Because it honed full-spectrum skills, Ragsdale said, CyberStakes Live went farther than similar DoD competitions.

“They’re not focusing on wholly defensive skills,” he explained. “We want them to be able to secure and defend our information systems, [and] to fully and deeply learn how to protect and defend those systems, we have them engage in what would be considered offensive activities in the cyber domain.”

Cybersecurity expert Dr. David Brumley helped to train the CyberStakes teams. He’s chief executive officer of a company called ForAllSecure, and at Carnegie Mellon University, he’s an associate professor of electrical and computer engineering with a courtesy appointment in the computer science department. ForAllSecure is a new company founded by a team of computer security researchers from CMU.

Measuring Capabilities

The CyberStakes Live contests measured a range of skills, including real-time binary exploitation, intrusion detection and prevention, persistence, memory analysis, reverse engineering at speed, infrastructure fuzzing, analytic reasoning, reconstructing source code from binary, bypassing software protection and anti-obfuscation techniques, and more.

Brumley said the cadets’ and midshipmen’s knowledge levels had improved significantly since the Service Academy CyberStakes challenge in 2014. “We continually give them new and more difficult challenges,” he added.

At the end of each phase of the competition -- both online and live -- Brumley said he and his team wrote reports that went to the competitor teams and DARPA that characterized the cadets’ and midshipmen’s performance.

“Last year, we said the teams seemed really good at solving problems, but they could work a little more on their automation for solving the problems,” he said. “You don't want to make it so you're typing a lot, because at the speed of cyber, things happen in an instant.”

During the Competition

The competitors took the comments to heart, Brumley said, and learned automation, which he said consisted of algorithms, system administration and getting different systems to work together.

Afterward, the teams said automation was one of the things that made them most effective during the competition.

“Another thing they did -- this is a big skill that we didn't see at all last year -- was the notion of reflection, where if someone attacks you and you didn't know about the vulnerability, you can analyze that attack, figure out the vulnerability, and patch it and potentially use it,” Brumley explained.

In terms of offensive cyber exploits, Brumley said, “most people don’t get that we're talking about computer security skills, and when we start talking about offense and defense, we're talking about applications of those skills. But it's really the same stuff.”

Vulnerabilities and Exploits

For example, he said, most people would expect locksmiths to be able to pick locks, because it helps them evaluate the security of locks. It’s the same thing in cyber.

“When we talk about finding vulnerabilities and coming up with exploits,” Brumley said, “what we're talking about is that [the cadets and midshipmen] are able to take a program and figure out where it could go wrong [and] demonstrate it, so that as [future military leaders], they know this is actually important.”

Brumley is a founding member of the Plaid Parliament of Pwning, a CMU cybersecurity team that is ranked No. 1 overall in worldwide competition hacking and that has won the DefCon capture-the-flag cybersecurity tournament –- described as a World Series of hacking -- two years in a row.

“We go against the best there, [and] we do international competitions,” Brumley said. “We go to Russia and China, … and everywhere we go, we meet some of the best hackers. The guy who did the first iPhone jailbreak is on our team. And it's really about the capability.”

Brumley said they want to teach the cadets and midshipmen the same kind of capability.

Showing Some Offense

To do that, he added, “you have to show some offense. You have to give them an opportunity to demonstrate that they know it.”

One thing the competition strongly emphasized this year, Ragsdale said, is the joint nature of work in the cyber domain.

“There's not just an Army or a Navy or a Marine Corps or an Air Force solution,” he said. “We fully anticipate that operations conducted in this domain will be inherently joint, and that we’ll have officers and enlisted and noncommissioned officers from each of those services working together.”

The cadets and midshipmen from the competition last year practically demanded the joint services capture-the-flag competition that was included in CyberStakes Live this year, Ragsdale said.

An Inherently Joint Domain

“They felt like they had so much to learn from their counterparts,” he added, “and if we kept them isolated on their own teams they wouldn't get as much of an opportunity to share their knowledge and skills and methods with others. And it turned out to be a highlight of the event.”

Ragsdale said this is the last year DARPA will sponsor the competitions, so the agency is actively seeking DoD transition partners, Ragsdale said.

The goal, he added, is to continue both competitions and potentially expand them within the service academies, and to include students in ROTC programs at other colleges and universities.

No comments:

Post a Comment